J. F. Van-niekerk and R. V. Solms, Information security culture: A management perspective, Computers & Security, vol.29, issue.4, pp.476-486, 2010.
DOI : 10.1016/j.cose.2009.10.005

J. Van-niekerk and R. V. Solms, Understanding Information Security Culture: A Conceptual Framework, Proc. ISSA, pp.1-10, 2006.

N. Kortjan and R. V. Solms, A conceptual framework for cybersecurity awareness and education in SA, South African Comput. Journal, vol.52, issue.2014 52, pp.29-41, 2014.

A. Da-veiga, A cyber-security culture research philosopy and approach to develop a valid and reliable measuring instrument, SAI Computing Conference 2016, p.10, 2016.

R. Reid and J. Van-niekerk, From Information Security to Cyber Security Cultures Organizations to Societies, Information Security for South Africa (ISSA), pp.1-7, 2014.
DOI : 10.1109/issa.2014.6950492

R. Reid and J. Van-niekerk, Towards an Education Campaign for Fostering a Societal , Cyber Security Culture, Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, pp.2014-174, 2014.

N. Gcaza, R. V. Solms, and J. Van-vuuren, An Ontology for a National Cyber-Security Culture Environment, Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, pp.2015-2016, 2015.

E. Schein, Organizational culture and leadership, 1992.

T. Schlienger and S. Teufel, Information security culture ? from analysis to change, Security in the Information Society, pp.191-201, 2002.

K. P. Wood, Inquiring Systems and Problem Structure: Implications for Cognitive Development, Human Development, vol.26, issue.5, pp.249-265, 1983.
DOI : 10.1159/000272887

H. A. Simon, The structure of ill structured problems, Artificial Intelligence, vol.4, issue.3-4, pp.181-201, 1973.
DOI : 10.1016/0004-3702(73)90011-8

C. Lynch, K. D. Ashley, N. Pinkwart, and V. Aleven, Concepts, Structures, and Goals: Redefining Ill-Definedness, Int. J. Artif. Intell. Educ, vol.19, issue.3, pp.253-266, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00702995

W. Reitman, Cognition and thought, 1965.

J. Voss and T. Post, On the solving of ill-structured problems, The nature of expertise, 1988.

J. D. Sinnott, A model for solution of ill-structured problems: Implications for everyday and abstract problem solving, 1989.

K. P. Wood, A secondary analysis of claims regarding the reflective judgment interview: Internal consistency, sequentially and intra-individual differences in ill-structured problem solving, Annual Meeting of the American Educational Research Association, 1994.

J. Bransford and B. Stein, The IDEAL problem solver: A guide for improving thinking, learning, and creativity, 1983.

A. Newell and H. Simon, Human problem solving, 1972.

N. and S. Hong, Well-structured and Ill-structured, " The Pennsylvania State University, 1998.

K. Krippendor, Content Analysis: An introduction to its methodology, 2004.

B. Downe-wambolt, Content analysis: Method, applications, and issues, Health Care for Women International, vol.15, issue.3, pp.313-321, 1992.
DOI : 10.1097/00006199-199103000-00014

M. Bengtsson, How to plan and perform a qualitative study using content analysis, NursingPlus Open, vol.2, pp.8-14, 2016.
DOI : 10.1016/j.npls.2016.01.001

B. Fridlund and C. Hildingh, Health and qualitative analysis methods, " in Qualitative research, methods in the service of health, pp.13-25, 2000.

M. Q. Patton, Qualitative, research & evaluation methods. California, 2002.

A. Malyuk and N. Miloslavskaya, Cybersecurity culture as an element of IT professional training, 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC), pp.205-210, 2016.
DOI : 10.1109/DIPDMWC.2016.7529390

N. Banks, Practise what you preach, Computer Fraud & Security, vol.2016, issue.4, pp.5-8, 2016.
DOI : 10.1016/S1361-3723(16)30035-5

Z. Tziarras, The Security Culture of a Global and Multi-levelled Cybersecurity Cyber- Development, Cyber-Democracy Cyber-Defense Challenges, Oppor. Implic. Theory, vol.9781493910, pp.113-116, 2014.

R. Reid and J. Van-niekerk, From Information Security to Cyber Security Cultures Organizations to Societies, Information Security for South Africa (ISSA), pp.1-7, 2014.
DOI : 10.1109/issa.2014.6950492

N. Kortjan and R. Solms, Fostering a cyber security culture: a case of South Africa, Proceedings of the 14th Annual Conference on World Wide Web Applications, 2012.

E. Luiijf, K. Besseling, and P. Graaf, Nineteen national cyber security strategies, International Journal of Critical Infrastructures, vol.9, issue.1/2, pp.3-31, 2013.
DOI : 10.1504/IJCIS.2013.051608

M. Hall, Why people are key to cyber-security, Network Security, vol.2016, issue.6, pp.9-10, 2016.
DOI : 10.1016/S1353-4858(16)30057-5

E. Kritzinger and S. Solms, A Framework for Cyber Security in Africa, Journal of Information Assurance & Cybersecurity
DOI : 10.5171/2012.322399

S. Ghernouti-hélie, A National Strategy for an Effective Cybersecurity Approach and Culture, 2010 International Conference on Availability, Reliability and Security, pp.370-373, 2010.
DOI : 10.1109/ARES.2010.119

T. Adelola, R. Dawson, and F. Batmaz, The urgent need for an enforced awareness programme to create internet security awareness in nigeria, Proceedings of the 17th International Conference on Information Integration and Web-based Applications &Services, iiWAS '15, pp.1-7, 2015.
DOI : 10.1145/2538862.2538990

A. W. Batteau, Creating a culture of enterprise cybersecurity, Int. J. Bus. Anthropol, vol.2, issue.2, pp.36-47, 2011.